| /linux/Documentation/netlabel/ |
| H A D | lsm_interface.rst | 13 network packets. It is intended to be used by LSM developers who want to make 27 configuration. It is up to the LSM developer to translate the NetLabel 29 particular LSM. 31 NetLabel LSM Protocol Operations 34 These are the functions which allow the LSM developer to manipulate the labels 44 label and the internal LSM security identifier can be time consuming. The 47 LSM has received a packet, used NetLabel to decode its security attributes, 48 and translated the security attributes into a LSM internal identifier the LSM 49 can use the NetLabel caching functions to associate the LSM internal 52 NetLabel translation mechanisms bypassed but the LSM translation mechanisms are
|
| H A D | cipso_ipv4.rst | 26 that it is set upon the socket's creation. The LSM can set the socket's CIPSO 35 IP layer without any special handling required by the LSM. However, in order 36 to decode and translate the CIPSO label on the packet the LSM must use the 39 LSM hook. 55 mappings from the network labels to the corresponding LSM identifiers. The
|
| /linux/Documentation/translations/zh_CN/security/ |
| H A D | lsm-development.rst | 14 当一种新的LSM的意图(它试图防范什么,以及在哪些情况下人们会期望使用它)在 15 ``Documentation/admin-guide/LSM/`` 中适当记录下来后,就会被接受进入内核。 16 这使得LSM的代码可以很轻松的与其目标进行对比,从而让最终用户和发行版可以更 17 明智地决定那些LSM适合他们的需求。 19 有关可用的 LSM 钩子接口的详细文档,请参阅 ``security/security.c`` 及相关结构。
|
| H A D | ipe.rst | 16 guide </admin-guide/LSM/ipe>`。 97 由于这些原因,决定创建一个新的LSM,其职责是仅限于本地完整性 137 IPE的策略是纯文本格式的。相较于其他Linux安全模块(LSM), 324 IPE不涉及单独的LSM钩子(或系统调用),而是涵盖操作。这
|
| H A D | credentials.rst | 173 5. LSM 175 Linux安全模块允许在任务执行操作时施加额外的控制。目前,Linux支持几种LSM选项。 201 * LSM security label; 214 通过(uid, gid)或(groups, keys, LSM security)进行访问。每个任务在其 394 这将修改凭据和进程的各个方面,给LSM提供机会做同样的修改,然后使用
|
| H A D | SCTP.rst | 13 SCTP的LSM支持 183 上面的 `SCTP的LSM支持`_ 章节描述了以下SCTP安全钩子,SELinux的细节 240 `SCTP的LSM支持`_ 提供了 ``@optname`` 摘要,并且还描述了当启用动态地址重新
|
| /linux/Documentation/bpf/ |
| H A D | fs_kfuncs.rst | 9 BPF LSM programs need to access filesystem data from LSM hooks. The following 18 1. These kfuncs are only permitted from BPF LSM function. 19 2. These kfuncs should not call into other LSM hooks, i.e. security_*(). For 21 the latter calls LSM hook ``security_inode_getxattr``.
|
| H A D | prog_lsm.rst | 5 LSM BPF Programs 8 These BPF programs allow runtime instrumentation of the LSM hooks by privileged 16 LSM hook: 20 Other LSM hooks which can be instrumented can be found in 61 * ``"lsm/file_mprotect"`` indicates the LSM hook that the program must 117 Attachment to LSM Hooks 120 The LSM allows attachment of eBPF programs as LSM hooks using :manpage:`bpf(2)` 124 The program can be detached from the LSM hook by *destroying* the ``link``
|
| H A D | bpf_licensing.rst | 78 Further, some BPF program types - Linux Security Modules (LSM) and TCP 81 registration step of LSM and TCP congestion control modules of the Linux 82 kernel is done through EXPORT_SYMBOL_GPL kernel functions. In that sense LSM
|
| /linux/Documentation/security/ |
| H A D | lsm.rst | 37 The Linux Security Modules (LSM) project was started by WireX to develop 38 such a framework. LSM was a joint development effort by several security 46 LSM Framework 49 The LSM framework provides a general kernel framework to support 50 security modules. In particular, the LSM framework is primarily focused 54 the infrastructure to support security modules. The LSM framework is 58 `LSM Capabilities Module`_. 60 The LSM framework includes security fields in kernel data structures and 67 The LSM security fields are simply ``void*`` pointers. 98 LSM hooks are maintained in lists. A list is maintained for each [all …]
|
| H A D | lsm-development.rst | 6 a new LSM is accepted into the kernel when its intent (a description of 8 use it) has been appropriately documented in ``Documentation/admin-guide/LSM/``. 9 This allows an LSM's code to be easily compared to its goals, and so 13 For extensive documentation on the available LSM hook interfaces, please
|
| H A D | landlock.rst | 6 Landlock LSM: kernel documentation 21 LSM). A Landlock rule shall not interfere with other access-controls enforced 144 * Documentation/admin-guide/LSM/landlock.rst
|
| /linux/Documentation/ABI/testing/ |
| H A D | procfs-attr-prev | 6 a Linux security module (LSM) active on the system 9 this interface is LSM dependent. 13 this interface are LSM dependent. 14 The format of the data used by this interface is LSM
|
| H A D | procfs-attr-current | 6 security module (LSM) that is active on the system. 9 of the task identified is LSM dependent. 14 the task identified are LSM dependent. 15 The format of the data used by this interface is LSM
|
| H A D | procfs-attr-exec | 6 by a Linux security module (LSM) active on the system 10 of the task identified is LSM dependent. 15 the task identified are LSM dependent. 16 The format of the data used by this interface is LSM
|
| H A D | ima_policy | 9 the policy can be constrained based on LSM specific data. 50 lsm: are LSM specific 127 Examples of LSM specific definitions: 190 either based on a filesystem's UUID (fsuuid) or based on LSM
|
| /linux/Documentation/translations/zh_CN/process/ |
| H A D | 3.Early-stage.rst | 31 模块(LSM)框架中的内核模块;这个模块可以配置为允许特定的应用程序访问实时 35 内核社区来说,这被视为对LSM框架的滥用(LSM框架并不打算授予他们原本不具备的
|
| /linux/Documentation/translations/zh_CN/userspace-api/ |
| H A D | no_new_privs.rst | 31 LSM)不会在execve调用后放松限制。 37 不过要小心,Linux安全模块(LSM)也可能不会在 ``no_new_privs`` 模式下收紧约束。 39 会干扰基于LSM的沙箱。)
|
| /linux/Documentation/translations/zh_TW/process/ |
| H A D | 3.Early-stage.rst | 34 模塊(LSM)框架中的內核模塊;這個模塊可以配置爲允許特定的應用程序訪問實時 38 內核社區來說,這被視爲對LSM框架的濫用(LSM框架並不打算授予他們原本不具備的
|
| /linux/security/lockdown/ |
| H A D | Kconfig | 6 Build support for an LSM that enforces a coarse kernel lockdown 10 bool "Enable lockdown LSM early in init" 13 Enable the lockdown LSM early in boot. This is necessary in order
|
| /linux/scripts/selinux/ |
| H A D | README | 1 Please see Documentation/admin-guide/LSM/SELinux.rst for information on
|
| /linux/Documentation/translations/zh_CN/userspace-api/ebpf/ |
| H A D | index.rst | 15 括网络,跟踪和Linux安全模块(LSM)等。
|
| /linux/Documentation/userspace-api/ebpf/ |
| H A D | index.rst | 10 (LSM).
|
| /linux/security/yama/ |
| H A D | Kconfig | 12 Documentation/admin-guide/LSM/Yama.rst.
|
| /linux/security/safesetid/ |
| H A D | Kconfig | 8 SafeSetID is an LSM module that gates the setid family of syscalls to
|